Auxilio Inc., best known for its managed print services to hospitals and other healthcare entities, is acquiring Redspin, a provider of HIPAA risk assessment services.
The proposed rules for Stage 3 of the HITECH Act "meaningful use" electronic health record incentive program come up short on privacy and security. But regulators have time to fix that.
Some security experts are concerned that narrower risk assessment requirements in a proposed Stage 3 rule for the HITECH Act EHR incentive program could confuse healthcare entities about the importance of conducting a broad HIPAA risk assessment.
Wipro is developing a new value-at-risk model to articulate and measure aggregate risk from cyberthreats. Can CISOs leverage this framework to determine and predict risk and quantify its complexity?
A recent blog about payments security generated a spirited debate about the current state of merchant security, why card breaches continue to be an issue and EMV's impact on fraud.
Anthem Inc. has refused to allow a federal watchdog agency to conduct vulnerability scans of its systems in the wake of its recent massive data breach. The health insurer also refused to allow scans by the same agency in 2013.
Because of lax information security controls, the systems that control air traffic in the United States are at "increased and unnecessary risk," GAO says. Leaders of the congressional panels with FAA oversight want to know why.
A new federal cyberthreat intelligence center could help the government build more resilient networks and better identify cyber-attackers, leading to arrests and punishments, says Harry Raduege, a former top Defense Department IT leader.
The recent cyber-attack on health insurer Anthem Inc. is a "call to action" for the healthcare sector to adopt a much more sophisticated approach to risk management, says security expert Lisa Gallagher of HIMSS.
In the wake of an "inebriated" government employee crashing a drone on the White House lawn, federal officials sound warnings over the potential weaponization of consumer drones. But is it anything more than a Hollywood-style movie plot?
A recent interview about why retailers say EMV without the PIN is a fruitless fraud-fighting effort has spurred debate among retailers and bankers. In the end, though, bankers' resistance to PIN is all about time and money.
Healthcare organizations and their business associates need to make three important resolutions in 2015 to better safeguard patient data and avoid the enforcement wrath of regulators.
In the wake of a data breach that followed a routine regulatory, a former regulator is asking why the agency failed to disclose the breach sooner, and why it has not accepted more responsibility for its error.
Lawmakers and their staffs are working behind the scenes to get one or perhaps two pieces of cybersecurity legislation enacted before the 113th Congress adjourns this month. But passage remains a longshot.
The use of big data for real-time threat analysis will become more commonplace among banks and credit unions in 2015, says Bill Stewart of Booz Allen Hamilton, who describes cybersecurity trends for the year ahead.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.